Conveyor belts of all types are prone to rips from impact by sharp objects in the flow path, which can lead to expensive belt failure. In this paper, we present a novel method for detecting conveyor belt rips. In cont...
详细信息
The proceedings contain 339 papers. The topics discussed include: traffic signal control method for single intersection based on cooperated vehicle infrastructure system;intelligent vehicle platform and signal process...
ISBN:
(纸本)9780784413036
The proceedings contain 339 papers. The topics discussed include: traffic signal control method for single intersection based on cooperated vehicle infrastructure system;intelligent vehicle platform and signal processing method applied to cooperative vehicle infrastructure;traffic congestion detection and notification in the urban expressway system using VANETs;a formulation method of control protocol for intersection signalbased on wireless communication technologies;a SEM-based study on resident's traffic mode choice behavior in Beijing;on the crossing contribute to traffic congestion problem analysis and countermeasure research;design of emergency accident handling system for expressways;method of traffic safety evaluation of newly designed highway based on driving simulation;and research of safety monitoring system for the operating vehicles inter-connection and inter-surveillance based on internet of things.
Recently, two methods for removing high density salt-and-pepper noise in images have been proposed by Esakkirajan et al. and Hong et al. However, their methods have not been yet compared experimentally. In this paper,...
详细信息
Recently, two methods for removing high density salt-and-pepper noise in images have been proposed by Esakkirajan et al. and Hong et al. However, their methods have not been yet compared experimentally. In this paper, we compare them and show some experimental results. Additionally, we propose a hybrid method which is derived by combining the two methods, and experimentally show that the proposed method achieves higher values of both peak signal-to-noise ratio (PSNR) and image enhancement factor (IEF) than the two methods.
This paper gives an example of a novel simple implementation of the EM algorithm for clustering images. Here we use a simple gray scale color feature to describe an image. When compared to results of other methods usi...
详细信息
ISBN:
(纸本)9781479932122
This paper gives an example of a novel simple implementation of the EM algorithm for clustering images. Here we use a simple gray scale color feature to describe an image. When compared to results of other methods using the same simple feature, we found that the proposed method performs well. These comparison results imply that this simple model can be extended to cluster images using more complex features such as texture, shape, and other color descriptors to further improve the precision and recall of the results in order to outperform the existing methods. Further research can prove that this simplified EM algorithm achieves robust classification of unrestricted image domain.
Many real networks exhibit strongly-skewed, heavy-tailed degree distributions, one of the indicators of so-called `complex' networks, and there is a lot of current research in this area. Much of this research requ...
详细信息
ISBN:
(纸本)9781479932122
Many real networks exhibit strongly-skewed, heavy-tailed degree distributions, one of the indicators of so-called `complex' networks, and there is a lot of current research in this area. Much of this research requires the generation of random graphs with the same degree distribution as one another, and it is important that these random graphs should be sampled from the space of all graphs with that degree sequence. In this paper we present a novel constructive proof of an existing theorem that sufficient random degree-preserving rewirings can potentially produce any graphs with a given degree distribution.
This paper reports on the JPEG compression tolerance of novel proposed digital watermarking algorithm that uses the morphological wavelet transform based on max-plus algebra. For objective evaluation, we investigated ...
详细信息
ISBN:
(纸本)9781479900664
This paper reports on the JPEG compression tolerance of novel proposed digital watermarking algorithm that uses the morphological wavelet transform based on max-plus algebra. For objective evaluation, we investigated the image quality and tolerance against graphical data compression attack of an image during the digital-watermarking contest presented by the Committee for Information Hiding and its Criteria (IHC). During benchmarks of this contest, graphical data compression was done to reduce the file size of original image (45.5 MB) to 1/10 or less and the error rate of embedding data was reduced to 0%. As a result, the embedded data could be completely extracted. The peak signal-to-noise ratio (PSNR) was 54.08-54.66 dB. Afterwards, additional graphical data compression was done to reduce the file size to 1/20 or less of the original picture image and the error rate was reduced to 0%, and the PSNR was 52.75-54.35 dB. By compressing the image by, about 99%, the smallest data size attained was 0.49 MB and the PSNR was about 52 dB and maintained very high image quality with 0% of error rate. From these results, the processing time of the proposed algorithm was confirmed to be about 2.2 to 148.6 times faster than that of conventional algorithms on embedded systems.
Summary form only given, as follows. The tutorial will present a holistic design and verification framework to investigation of image/video processing in embedded environments, with emphasis on system-on-chip architec...
详细信息
Summary form only given, as follows. The tutorial will present a holistic design and verification framework to investigation of image/video processing in embedded environments, with emphasis on system-on-chip architectures. Starting with an executable specification of a target application, subsequent transformations are performed across different levels of abstraction until the final implementation. The hardware/software partitioning is facilitated through the integration of OpenCV and SystemC at design time and OpenCV and Linux in the run-time environment. We built a modular rapid prototyping camera system, the RazorCam, based on FPGA, which allows complex application to be explored at different abstraction level and evaluated in realistic run-time environment. The platform will be used in this tutorial with a couple of designs to demonstrate the viability of our approach
In recent years, CMOS image Sensors (CIS) have increasingly become major players on the Solid State Imaging market, the market on which Charge Coupled Devices (CCD) Highly precise circuit integration capability makes ...
详细信息
ISBN:
(纸本)9781467348669;9781467348652
In recent years, CMOS image Sensors (CIS) have increasingly become major players on the Solid State Imaging market, the market on which Charge Coupled Devices (CCD) Highly precise circuit integration capability makes CMOS technology suitable for Implementation in single-chip imaging systems while reducing all other secondary effects. But, still there are many effects concerning the optimistic operation of the CIS device. The effects like the quantified temperature, global & local leakage and non-uniformities induced by on-chip temperature variations were some among them. Striving towards novel design of the CIS device may reduce some of these effects. With this perspective the transfer gate transistor approach was studied and possibilities of incorporating have to be explored. Various optoelectric devices can be simulated by using TCAD Sentaurus. The device, optical and the process simulation flow addresses the needs of the optoelectronic community to simulate CMOS image sensor device.
based on poly-phase sampling and lookup table encryption techniques, a new image sharing scheme is presented with several aspects of innovations in this paper. Each shadow can be independently decrypted to obtain part...
详细信息
based on poly-phase sampling and lookup table encryption techniques, a new image sharing scheme is presented with several aspects of innovations in this paper. Each shadow can be independently decrypted to obtain part of the original image, any pair of decrypted sub-images has very high correlation, it still obtains acceptable image quality when channel congestion occurs, and quality refinement of the recovered image is proportional to number of shadows obtained and achieves perfectly with all shadows. As a result, our method is highly suitable for internet applications in adverse environments with real-time progressive reconstruction. Experimental results demonstrate the promising characteristics of our method.
暂无评论